| 1 | 2013 | FSE | pc |
| 2 | 2012 | FSE | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2011 | Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time | jofc | 427-445 |
| 2 | 2009 | An Efficient State Recovery Attack on X-FCSR-256 | fse | 23-37 |
| 3 | 2008 | Breaking the F-FCSR-H Stream Cipher in Real Time | asiacrypt | 557-569 |
| 4 | 2007 | Two General Attacks on Pomaranch-Like Keystream Generators | fse | 274-289 |
| 5 | 2007 | A Key Recovery Attack on Edon80 | asiacrypt | 568-581 |
| 6 | 2005 | Some Attacks on the Bit-Search Generator | fse | online |
| 7 | 2004 | Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables | eprint | online |
| 8 | 2004 | Correlation Attacks Using a New Class of Weak Feedback Polynomials | fse | 127-142 |
Coauthors of Martin Hell |